Skip to Main Content

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog August 29 2024

Gobbling Up Forensic Analysis Data Using Velociraptor

Lately I have been working with Velociraptor for its endpoint and digital forensic capabilities and specifically spent time in many cases in the past two years…

Read about this article
Blog August 22 2024

The Hunter’s Workshop: Mastering the Essentials of Threat Hunting

As an incident unfolds, skilled threat hunters with a special talent for uncovering hidden threats stand at the ready. These hunters smoke jump into the chaos…

Read about this article
Blog August 15 2024

Oops I UDL'd it Again

IntroductionPhishing. We all love phishing. This post is about a new phishing technique based on some legacy knowledge I had that can be used to get past email…

Read about this article
Blog August 13 2024

Must I TRA?: PCI Targeted Risk Analysis

Use of Targeted Risk Analysis (TRA) is a PCI best practice until March 31, 2025, at which time it becomes required for several controls across many assessment…

Read about this article
Blog August 06 2024

Execution Guardrails: No One Likes Unintentional Exposure

A red teamer's guide to avoiding common mistakes when creating a sophisticated implant, including hostname keying, network keying, and external keying, with a…

Read about this article
Blog August 01 2024

Government Contractor’s Ultimate Guide to CUI

Controlled Unclassified Information (CUI) is information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the…

Read about this article
Blog July 29 2024

Specula - Turning Outlook Into a C2 With One Registry Change

There exist a few singular Registry changes that any non-privileged user can make that transform the Outlook email client into a beaconing C2 agent. Given that…

Read about this article
Blog July 25 2024

Lapse of Control: Applauding PCI SSC for FAQ 1572

I want to applaud the PCI Security Standards Council (PCI SSC) for FAQ 1572 published in March of 2024 for simply and effectively answering a question asked by…

Read about this article
Blog July 18 2024

What is Your Compliance Kryptonite?

Understanding PCI DSS requirements and avoiding misinterpretations of security controls can be frustrating for organizations, especially when it comes to…

Read about this article
Blog July 16 2024

Technical Analysis: Killer Ultra Malware Targeting EDR Products in Ransomware Attacks

This post was written by John Dwyer, Director of Security Research at Binary Defense, and made possible through the contributions of TrustedSec Senior Research…

Read about this article
Blog July 11 2024

dirDevil: Hiding Code and Content Within Folder Structures

Welcome back to another round of "Hiding in Plain Sight," exploring weird places to stash data or payloads. In our last edition, we explored an easy method of…

Read about this article
Blog July 09 2024

HackingDave’s Rule of Five

Implementing the Rule of Five helps you prioritize tasks that align with your long-term goals, cutting through everyday distractions and fostering personal…

Read about this article

Loading...